Cisco Blogs


Cisco Blog > Security

Correlating NetFlow Data for Proactive Security: Network Notoriety

Prelude

In this short article the reader will first learn what NetFlow is and how it works. Next the reader will understand how it can be as an important security tool. Finally, a technique for correlating NetFlow results with public sources of Internet reputation, along with the tool “Netoriety,” which implements the technique, will be introduced and explained.
Read More »

Tags: , ,

Cisco IPS Sensor Default Signature Configuration Modifications

The threat landscape is an ever evolving environment that must be addressed with constant iteration. Since the Cisco Intrusion Prevention System signature configuration has grown over the past few years, the Cisco Security Research and Operations IPS Signature Development Team performed an exhaustive review of the default IPS signature settings currently shipping. As a result of that analysis, the team will be releasing changes to the default signature set via signature updates in a two-phase process over the course of several months.

Read More »

Tags: , ,

New User Interfaces in Cars – flashy but are they safe?

Up until recently I was an owner of a hybrid car from one of the leading car manufacturers. The mechanical side of the car was good but I always had some serious doubts about the car’s cockpit. In particular, the touch screen mounted squarely in the middle of the dashboard, presumably to be equally accessible to the driver and the front passenger.

Read More »

Tags: , ,

Best Practices for Application Delivery in Virtualized Networks – Part II

As we start off this New Year, how about including a resolution to improve application delivery? In Best Practices for Application Delivery in Virtualized Networks – Part I , we covered key application delivery challenges that have come up due to the complexities of managing the many types of applications that enterprises use today, and further complicated by data center consolidation and virtualization. We then covered some best practices, courtesy of Dr. Jim Metzler’s 2011 Application Service Delivery Handbook, which recommended taking a lifecycle approach to planning and managing application performance.

A key step to the lifecycle approach is to implement network and application optimization tools, such as WAN Optimization solutions and Application Delivery Controllers, including server load balancers. Of course, these solutions are not new to the market and already address many of the needs that exist with delivering enterprise applications in virtualized data centers – namely, the need to ensure network reliability, availability and security for users accessing these applications. In this post, we will discuss a recent study by IDC, where IT decision makers across Europe and the US spoke out about their strategies for using server load balancers to deal with emerging challenges.



.                                                                                                                                                                                                                                                                                              What important attributes do you look for in your server load balancers?

Read More »

Tags: , , , , , , , , , , , , , , , , , , , , , , , , , , , , ,

Online Shopping: A Classic Case of Convenience vs Security

It is certainly a new day and age for many aspects of today’s society. One prominent sector that continues to lead by example in this area is the Internet, more specifically the online shopping environment. Note that online shopping is not a simple matter of go to a website, click “buy,” and checkout. That would be too simple. Ironically the purchase aspect itself tends to be the simplest matter here. The crux of the experience begins with the search and research phase. What exactly does one need/want? Is there a particular brand in mind? Is there a popular alternative? The convenience of asking and gathering answers to these questions and many more begin the journey, and thanks to the power and slew of resources the Internet provides, shoppers are able to search common products, brands, uses, verify details such as durability, ease of use and more based on the numerous rating systems, applications, web 2.0 solutions, social networking, and the ongoing phenomena that continue to evolve. So what does this mean? What does this have to do with security? Quite simply, all of this equates to more TIME on the Internet. Furthermore, the continued rise in scam and theft activities during the holidays is an additional means for concern. As mentioned in a recent Cyber Risk Report Law enforcement and government agencies continue to search and seize counterfeit and fraudulent websites. This includes counterfeit merchandise in addition to fraudulent website domains. More time spent on the Internet means there is more potential for exposure to threats and vulnerabilities. Simple math right? That said, let’s look at some numbers to provide valued context…….

Read More »

Tags: